Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.
When integrated with a UEM solution by default, Windows Information Protection (WIP) acts as its own container and maintains a native user experience.
A Colombian security researcher discovered a flaw that could enable attackers to steal Windows NTLM password hashes without any user interaction.
The cybercriminals behind Locky ransomware have adopted a new DDE hijacking technique to infect as many victims as possible while evading detection.
Researchers uncovered two security vulnerabilities in Microsoft Windows that could put businesses at risk of credential forwarding and password cracking.
It appears that the current Petya payload is being distributed using the same exploits that were part of the leaks that powered the spread of WannaCry.
Security researchers linked three cyber espionage campaigns to a group that exploits leaked Hacking Team tools and flaws in outdated software.
Researchers discovered a haunting technique they're calling a GhostHook attack, which uses a feature in Intel CPUs to take over 64-bit Windows.
Depending on who you ask, the Fireball malware infected somewhere between 40 and 250 million Windows devices. The potential danger, however, is undisputed.
To defend your infrastructure against future exploits, it's critical to disable the insecure original version of the SMB protocol.